Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32451
Software to Encrypt Messages Using Public-Key Cryptography

Authors: E. Inzunza-González, C. Cruz-Hernández, R. M. López-Gutiérrez, E. E. García-Guerrero, L. Cardoza- Avendaño, H. Serrano-Guerrero


In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to generate different public keys from two prime numbers provided by the user, the user must then select a public-key to generate the corresponding private-key. To encrypt the information, the user must provide the public-key of the recipient as well as the message to be encrypted. The generated ciphertext can be sent through an insecure channel, so that would be very difficult to be interpreted by an intruder or attacker. At the end of the communication, the recipient can decrypt the original message if provide his/her public-key and his/her corresponding private-key.

Keywords: Asymmetric cryptography, Prime number, Publickey, Private-key, Software.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1585


[1] Rivest, R., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM. 21 (1978), pp. 120-126.
[2] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley & Sons, Inc. 1996.
[3] A.J. Menezes, P.C. Van Oorschot y S.A. Vanstone, 1997. "Handbook of Applied Cryptography", CRC Press. pp 15-28 and. 283-291.
[4] J. A. Buchmann, Introduction to Cryptography. Marietta, GA: Springer- Verlag, 2000, pp. 139-153.
[5] D.R. Stinson, Cryptography: Theory and Practice, Tercera edici├│n, CRC Press. 2005.
[6] A. Fuster, Técnicas criptogr├íficas de protecci├│n de datos, Ed. Ra-Ma, 2001.
[7] Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, Nov. 1976, 644-654. M. Bellare, P. Rogaway, Introduction to Modern Cryptography, San Diego, CA., 2005. pp. 211-230.
[8] V. Zur Gathen, Joachim; Gerhard, J├╝rgen, "The Euclidean Algorithm", en Modern Computer Algebra. Cambride University Press, (2003), ISBN 0-521-82646-2.
[9] W. Stallings, Cryptography and Network Security: Principles and Practice, 2da. Edici├│n, Prentice-Hall, New Jersey, 1999.
[10] Yang T. Wu C.W. and Chua L.O., Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I 44(5)(1997)469-472.
[11] Cruz-Hernández C. and Serrano-Guerrero H., Cryptosystems based on synchronized Chua-s circuits. In Procs. of the 16th IFAC World Congress, July 3-8(2005) Prague, Czech Republic.
[12] R.M. L├│pez-Gutiérrez, C. Cruz-Hern├índez, C. Posadas-Castillo, and E.E.Garc├¡a-Guerrero, Encrypted audio transmission using synchronized Nd:YAG lasers, Proceedings Of World Academy Of Science, Engineering And Technology Vol. 30 (2008), ISSN 1307-6884.
[13] C. Posadas-Castillo, R. M. L├│pez-Gutiérrez, C. Cruz-Hern├índez, Synchronization of chaotic solid-state Nd:YAG lasers: Application to secure communication, Comm. in Nonlinear Science and Numerical Simulation 13, (2008), pp. 1655-1667.
[14] A.Y. Aguilar-Bustos a,b, C. Cruz-Hernández, Synchronization of discrete-time hyperchaotic systems: An application in communications, Chaos, Solitons and Fractals, In press doi:10.1016/j.chaos.2008.05.012.
[15] L. G├ímez-Guzm├ín a, C. Cruz-Hern├índez a,*, R.M. L├│pez-Gutiérrez, E.E. Garc├¡a-Guerrero, Synchronization of Chua-s circuits with multiscroll attractors: Application to communication, Commun Nonlinear Sci Numer Simulat, 14 (2009) pp. 2765-2775.